Corporate Partners

Top IT Security Bloggers

  • Google adds deceptive software warnings to Safe Browsing service

    Sophos - Naked Security
    The days of having your homepage switched or suddenly discovering a mysterious toolbar in your browser may be set to come to an end following an announcement from Google yesterday. From next week, Chrome will display a message whenever a piece of software attempts to do anything sneaky or unexpected with your browser or computer.
  • Russian PM has his Twitter account hacked, announces “I resign”

    Graham Cluley
    There may be red faces in Red Square, after Russian prime minister Dmitry Medvedev had his Twitter account hacked.

    Learn more in my article on the We Live Security blog.
  • How Secure is Your Security Badge?

    Krebs on Security
    Security conferences are a great place to learn about the latest hacking tricks, tools and exploits, but they also remind us of important stuff that was shown to be hackable in previous years and never really got fixed. Perhaps the best example of this at last week's annual DefCon security conference in Las Vegas came from hackers who built on research first released in 2010 to show just how trivial it still is to read, modify and clone most HID cards -- the rectangular white plastic "smart" cards that organizations worldwide distribute to employees for security badges.
  • Thousands of computers open to eavesdropping and hijacking

    Sophos - Naked Security
    Many, many people and businesses are running a remote access tool, Virtual Network Computing, without a password. The tool lets people see everything we do online or reach through and take over our systems. The list of exposed sites is astonishing: everything from power stations to pharmacies to people watching porn.
  • “Girl killed by husband just because she kissed another men” Facebook scam

    Graham Cluley
    Facebook users are at risk of infecting their computers with malware, if they fall for the latest gruesome video scam spreading on the social network.
  • Snowden: NSA working on ‘MonsterMind’ cyberwar bot

    Sophos - Naked Security
    The cyber defense system would instantly and autonomously neutralize foreign cyberattacks against the US and could also be used to launch retaliatory strikes. To do so, it would have to control and analyze all traffic entering the US - a chilling prospect that was the last straw, the whistleblower says.
  • 7 Places to Check for Signs of a Targeted Attack in Your Network

    TrendLabs - Malware Blog
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, thus making their detection a big challenge. As we’ve stressed in our previous entry about common misconceptions about targeted attacks, there is no one-size-fits-all solution against it; enterprises need to arm themselves with protection that can provide sensors where needed, as well as IT […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro7 Places to Check for Signs of a Targeted Attack in Your Network
  • 7 Places to Check for Signs of a Targeted Attack in Your Network

    Trend Micro - Security Intelligence
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, thus making their detection a big challenge. As we’ve stressed in our previous entry about common misconceptions about targeted attacks, there is no one-size-fits-all solution against it; enterprises need to arm themselves with protection that can provide sensors where needed, as well as IT […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro7 Places to Check for Signs of a Targeted Attack in Your Network
  • Wearing Your Tech on Your Sleeve

    Trend Micro - Security Intelligence
    Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see people accessorized in pieces of equipment that complement their day-to-day activities. Some might assume that wearable smart devices are complicated futuristic gadgets. However, they […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroWearing Your Tech on Your Sleeve
  • Wearing Your Tech on Your Sleeve

    TrendLabs - Malware Blog
    Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see people accessorized in pieces of equipment that complement their day-to-day activities. Some might assume that wearable smart devices are complicated futuristic gadgets. However, they […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroWearing Your Tech on Your Sleeve

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place